- Caching and Content Delivery
- Opportunistic and Delay-Tolerant Networks
- Cooperative Communication and Network Coding
- Peer-to-Peer Network Technologies
- Advanced Data Storage Technologies
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Complex Network Analysis Techniques
- Geometric and Algebraic Topology
- Blockchain Technology Applications and Security
- Network Packet Processing and Optimization
- Mathematical Dynamics and Fractals
- Data Stream Mining Techniques
- IPv6, Mobility, Handover, Networks, Security
- Network Traffic and Congestion Control
- Carbon and Quantum Dots Applications
- semigroups and automata theory
- Nonlinear Dynamics and Pattern Formation
- Aquaculture disease management and microbiota
- Recommender Systems and Techniques
- Age of Information Optimization
- Mobile Ad Hoc Networks
- Advanced Malware Detection Techniques
Harbin Institute of Technology
2010-2024
Peng Cheng Laboratory
2021-2024
Huazhong University of Science and Technology
2020-2024
Guangxi University
2023-2024
Hefei University of Technology
2023
Gannan Medical University
2022
PLA Army Engineering University
2020
Beijing Institute of Technology
2018-2020
National University of Defense Technology
2020
Beijing City University
2019
Logs play an important role in the maintenance of large-scale online service systems. When fails, engineers need to examine recorded logs gain insights into failure and identify potential problems. Traditionally, perform simple keyword search (such as "error" "exception") that may be associated with failures. Such approach is often time consuming error prone. Through our collaboration Microsoft product teams, we propose LogCluster, clusters ease log-based problem identification. LogCluster...
Vehicular named data networking (VNDN) is a architecture candidate to support various kinds of content-oriented applications in high dynamic topology environment. Its inherent in-network caching facilitates content delivery and the communication efficiency vehicular network. However, during process delivery, fast varying vehicle mobility changes position relay routers, which makes packet delivered through reverse path difficult. Furthermore, frequent link disruption retransmission lead...
Many solutions have been recently proposed to support the processing of streaming graphs. However, for each graph snapshot a graph, new states vertices affected by updates are propagated irregularly along topology. Despite years' research efforts, existing approaches still suffer from serious problems redundant computation overhead and irregular memory access, which severely underutilizes many-core processor. To address these issues, this paper proposes topology-driven programmable...
Large low Earth orbit (LEO) satellite constellations are intended to provide global low-latency high-bandwidth Internet connectivity. Due their large scale and high mobility nature, networking is a big challenge. In this paper, we investigate applying Named Data Networking (NDN) scenario. Specifically, discuss that NDN's architectural benefits, such as adaptive forwarding, in-network caching, off-the-grid communication, data mule service, in-network/edge computing, support, data-centric...
This innovative research integrates methodologies from two distinct studies to advance our comprehension of immersive virtual experiences within the realms fashion and e-commerce. By amalgamating insights both methodologies, this refined approach introduces novel components, including a shopping environment, post-VR behavior analysis, biometric data collection, extended interviews, longitudinal study design, control group implementation. Participants engaged in 360-degree VR shows using...
Reentrancy vulnerability as one of the most notorious vulnerabilities, has been a prominent topic in smart contract security research. Research shows that existing detection presents range challenges, especially contracts continue to increase complexity. Existing tools perform poorly terms efficiency and successful rates for vulnerabilities complex contracts. To effectively detect reentrancy with logic, we propose tool named SliSE. SliSE’s process consists two stages: Warning Search Symbolic...
This paper reports a novel method for identification of two aliphatic position isomers between α-ketoglutaric acid (α-KA) and β-ketoglutaric (β-KA) by their different perturbation effects on Briggs-Rauscher oscillating system, in which tetraaza-macrocyclic complex [NiL](ClO4)2 is used as the catalyst. The ligand L 5,7,7,12,14,14-hexamethyl-1,4,8,11-tetraazacyclotetradeca-4,11-diene. experimental results have shown that addition α-KA into system does not affect patterns, while presence β-KA...
Domain Name System (DNS) is a widely used infrastructure for remote control and batch management of IoT devices. As critical Internet infrastructure, DNS structured as tree‐like hierarchy with single root zone authority at the top, which puts operation risk from point failure. The current lack transparency accountability, since only file published final outcome operations inside authority. Towards distributed in DNS, this paper presents blockchain‐based architecture—RootChain, composed...
Abstract The reentrancy vulnerability in smart contracts has caused significant losses the digital currency economy. Existing solutions for detecting and repairing this are limited scope lack a comprehensive framework. Additionally, there is currently of guidance methods effectively pinpointing location vulnerabilities. proposed bytecode‐level method addresses these challenges by incorporating detection module, an auxiliary localization repair module. An opcode classification introduced...
Publish/Subscribe (Pub/Sub) is becoming an increasingly popular message delivery technique in the Internet of Things (IoT) era. However, classical not suitable for some emerging IoT applications such as smart grid, transportation and sensor/actuator due to its lack QoS capability.
Large low Earth orbit (LEO) satellite constellations provide low-latency and high-bandwidth Internet connectivity at the global scale. One major challenge is to handle frequent handovers. Named Data Networking (NDN) adopts a pull-based communication model, which allows users retrieve data that fail come back because of handovers by retransmitting corresponding requests, hence simplifying mobility management when retrieving data. However, we find relying on such retransmissions alone can be...
Scanning activities are usually conducted by infected hosts to discover other vulnerable or a motivated adversary gather information, and typically precursor most of the cyber attacks. There many scan detection approaches at present; however, them focus on enterprise-level network where traffic volume is low, bi-directional packet-level information available. This paper proposes new port approach-time based flow size distribution sequential hypothesis testing TFDS briefly, for high-speed...
In order to make device-to-device (D2D) content sharing give full play its advantage of improving local area services, one the important issues is decide channels that D2D pairs occupy. Most existing works study this issue in static environment, and ignore guidance for select channel adaptively. paper, we investigate dynamic environment where pairs' activeness wireless are dynamic. Specifically, propose a pricing-based approach guide different according spectrum resource states Then,...
With the development of scientific information technology, emergence Internet Things (IOT) promoted industry once again to a new stage economic and technological development. From perspective confidentiality, integrity, availability security, this paper analyzed current state IOT security threats, then researched primary technologies architecture. architecture established foundation for reliable system IOT.
Traffic Information System (TIS) is a major application over vehicular networks. Decentralized TIS relies on vehicle-2-vehicle communications, and efficient traffic information dissemination challenge. In this paper, we propose preliminary design to support the retrieval in ad hoc networks (VANET). Our adopts an information-centric communication model, probabilistic forwarding strategy based names geolocations. We implemented prototype of our evaluated its performance ndnSIM.